Prof. G Ram Reddy Library
Image from Google Jackets

Surveillance in action : technologies for civilian, milltary and cyber surveillance / edited by Panagiotis Karampelas and Thirimachos Bourlai

Contributor(s): Material type: TextTextPublication details: Cham : Springer, 2017Description: xiv, 412 pages : illustrations (chiefly color) ; 25 cmISBN:
  • 9783319685328
Subject(s): DDC classification:
  • 23 621.38928 Su79
Contents:
Part I - Surveillance of Human Features.- A Survey of Using Biometrics for Smart Visual Surveillance: Gait Recognition; I. Bouchrika.- Comparative Face Soft Biometrics for Human Identification; N.Y. Almudhahka et al.- Video-Based Human Respiratory Wavelet Extraction and Identity Recognition; X. Yang, T. Bourlai.- A Study on Human Recognition using Auricle and Side View Face Images; S. El-Naggar et al.- Cross-spectral Iris Matching for Surveillance Applications; M.A. M. Abdullah et al.- Facial Surveillance and Recognition in the Passive Infrared Bands; N. Osia et al.- Deep Feature Learning for Classification when using Single Sensor Multi-Wavelength based Facial Recognition Systems in SWIR Band; N. Narang, T. Bourlai.- Part II - Surveillance for Security and Defense.- Managing Uncertainty from the Sky: Surveillance through three Generations of Commercial Earth Observation Satellites; A. Kolovos.- Drones Surveillance - Challenges and Techniques; A. Kokkalis, T.I. Lekas.- Early Warning Against Stealth Aircraft, Missiles and Unmanned Aerial Vehicles; K.C. Zikidis. Mobile Data Fusion for Maritime Surveillance; E. Sakkopoulos et al.- Mobile stand-off and stand-in surveillance against biowarfare and bioterrorism agents; M.E. Kambouris.- Social Networks for Surveillance and Security: 'Using Online Techniques to make something happen in the real or cyber world'; B. Harbisher.- Surveillance, targeted killing and the fight against Terrorism: a fair-played game?; I.K. Lekea.- Part III - Cyber Surveillance Data Hiding in the Wild: Where Computational Intelligence Meets Digital Forensics; V. Pomponiu et al.- Methods to Detect Cyber threats on Twitter; P. Rao et al.- Detecting Users Who Share Extremist Content on Twitter; Y.Wei, L.Singh.- An Organizational Visualization Profiler Tool Based on Social Interactions; P. Karampelas.- Cyber-Surveillance Analysis for Supercomputing Environments; A. D. Clark, J. M. Absher.-
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Status Date due Barcode
Books Library and Documentation Division 621.38928 Su79 (Browse shelf(Opens below)) Available 109624

Part I - Surveillance of Human Features.- A Survey of Using Biometrics for Smart Visual Surveillance: Gait Recognition; I. Bouchrika.- Comparative Face Soft Biometrics for Human Identification; N.Y. Almudhahka et al.- Video-Based Human Respiratory Wavelet Extraction and Identity Recognition; X. Yang, T. Bourlai.- A Study on Human Recognition using Auricle and Side View Face Images; S. El-Naggar et al.- Cross-spectral Iris Matching for Surveillance Applications; M.A. M. Abdullah et al.- Facial Surveillance and Recognition in the Passive Infrared Bands; N. Osia et al.- Deep Feature Learning for Classification when using Single Sensor Multi-Wavelength based Facial Recognition Systems in SWIR Band; N. Narang, T. Bourlai.- Part II - Surveillance for Security and Defense.- Managing Uncertainty from the Sky: Surveillance through three Generations of Commercial Earth Observation Satellites; A. Kolovos.- Drones Surveillance - Challenges and Techniques; A. Kokkalis, T.I. Lekas.- Early Warning Against Stealth Aircraft, Missiles and Unmanned Aerial Vehicles; K.C. Zikidis. Mobile Data Fusion for Maritime Surveillance; E. Sakkopoulos et al.- Mobile stand-off and stand-in surveillance against biowarfare and bioterrorism agents; M.E. Kambouris.- Social Networks for Surveillance and Security: 'Using Online Techniques to make something happen in the real or cyber world'; B. Harbisher.- Surveillance, targeted killing and the fight against Terrorism: a fair-played game?; I.K. Lekea.- Part III - Cyber Surveillance Data Hiding in the Wild: Where Computational Intelligence Meets Digital Forensics; V. Pomponiu et al.- Methods to Detect Cyber threats on Twitter; P. Rao et al.- Detecting Users Who Share Extremist Content on Twitter; Y.Wei, L.Singh.- An Organizational Visualization Profiler Tool Based on Social Interactions; P. Karampelas.- Cyber-Surveillance Analysis for Supercomputing Environments; A. D. Clark, J. M. Absher.-

There are no comments on this title.

to post a comment.

© Prof. G Ram Reddy Centre Library, Indira Gandhi National Open University, Maidan Garhi, New Delhi, 110068
+91-011-29532797 | FAX+91-011-29533393 |